O Level Exam : Student Portal
Email address
Password
Remember me
Forgot password?
Sign In
Google
Facebook
Don't have an account?
Register now
O Level Online Exam
Menu mobile
Home
MCQ Topic Wise
INFORMATION TECHNOLOGY TOOLS AND NETWORK BASICS
New
WEB DESIGNING AND PUBLISHING
New
PROGRAMMING AND PROBLEM SOLVING THROUGH PYTHON
New
INTERNET OF THINGS AND ITS APPLICATIONS
New
Online Mock Test
INFORMATION TECHNOLOGY TOOLS AND NETWORK BASICS
New
WEB DESIGNING AND PUBLISHING
New
PROGRAMMING AND PROBLEM SOLVING THROUGH PYTHON
New
INTERNET OF THINGS AND ITS APPLICATIONS
New
Old Papers
Practical Questions
Projects
True/False Questions : OVERVIEW OF FUTURE SKILLS AND CYBER SECURITY For NIELIT O Level Exam
OVERVIEW OF FUTURE SKILLS AND CYBER SECURITY For NIELIT O Level Exam
00:00:00
English
Hindi
Question No# :
01
out of 20
Report Bug
Bookmark
The full name of NASSCOM is National Association of Software and Service Companies?
NASSCOM का पूरा नाम National Association of Software and Service Companies होता है?
A.
TRUE
B.
FALSE
Question No# :
02
out of 20
Report Bug
Bookmark
Spware monitors user activity on internet and transmit that information in the background to someone else
Spware monitors user activity on internet and transmit that information in the background to someone else
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
03
out of 20
Report Bug
Bookmark
Gigabyte is equal to 1000 kilobytes.
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
04
out of 20
Report Bug
Bookmark
Mixed Reality Experience Combines Elements From Virtual Reality And Augmented Reality?
मिश्रित वास्तविकता, अनुभव आभासी वास्तविकता और संवर्धित वास्तविकता से तत्वों को जोडती है?
A.
TRUE
B.
FALSE
Question No# :
05
out of 20
Report Bug
Bookmark
Hacking a computer is always illegal and punishable by law.
कंप्यूटर को हैक करना हमेशा कानून द्वारा अवैध और दंडनीय है
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
06
out of 20
Report Bug
Bookmark
In a non-moderated newsgroup, only selected members have right to post (write) a message directly on a virtual notice board?
एक नॉन-मॉडरेट न्यूज़ ग्रुप में, केवल चयनित सदस्यों को सीधे वर्चुअल नोटिस बोर्ड पर संदेश पोस्ट करने (लिखने) का अधिकार होता है?
A.
TRUE
B.
FALSE
Question No# :
07
out of 20
Report Bug
Bookmark
Cyber security protects the data and integrity of computing assets belonging to or connecting to an organization’s network.
Cyber security protects the data and integrity of computing assets belonging to or connecting to an organization’s network.
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
08
out of 20
Report Bug
Bookmark
Push technology enables news and other content providers to automatically supply subscribers with information by downloading content to the user’s desktop.
A.
TRUE
B.
FALSE
Question No# :
09
out of 20
Report Bug
Bookmark
Copyright refers to the freedom from intrusion by the public, especially as a right.
A.
TRUE
B.
FALSE
Question No# :
10
out of 20
Report Bug
Bookmark
A firewall is a security device deployed at the boundary of corporate intranet to protect it from unauthorized access
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
11
out of 20
Report Bug
Bookmark
Cipher text is the meaningful form of encrypted message that can be read in transit by anyone.
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
12
out of 20
Report Bug
Bookmark
ATM is Automatic Teller Machine in terms of Transfer Mode.
एटीएम ट्रांसफर मोड के संदर्भ में स्वचालित टेलर मशीन है।
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
13
out of 20
Report Bug
Bookmark
Buying legal software from reputed retailers or organizations is a way to stop Software Piracy.
A.
TRUE
B.
FALSE
Question No# :
14
out of 20
Report Bug
Bookmark
The main function of proxy application gateway is to allow intranet users to securely use specified internet services
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
15
out of 20
Report Bug
Bookmark
Phishing is form of fraud where fraudulent emails are set from reputable sources
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
16
out of 20
Report Bug
Bookmark
Spamming refers to the use of electronic messaging systems to send unwanted bulk messages especially advertising, indiscriminately.
A.
TRUE
B.
FALSE
Question No# :
17
out of 20
Report Bug
Bookmark
A Trojan horse program will replicate itself via files that move from one computer to another.
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
18
out of 20
Report Bug
Bookmark
Digital signatures develop two types of key one Private key and second Public key that are mathematically linked
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
19
out of 20
Report Bug
Bookmark
Copyrights are automatically associated with all written documents that contain original material.
A.
TRUE
TRUE
B.
FALSE
FALSE
Question No# :
20
out of 20
Report Bug
Bookmark
Mobile Device Management Feature Not Available In Windows 10?
विंडोज 10 में मोबाइल डिवाइस प्रबंधन सुविधा उपलब्ध नहीं है?
A.
TRUE
B.
FALSE
Latest Current Affairs 2025
Online Exam Quiz for One day Exam
Online Typing Test
CCC Online Test
Python Programming Tutorials
Best Computer Training Institute in Prayagraj (Allahabad)
Online MBA 2 years
Online MCA
Online BCA
Best Website and Software Company in Allahabad